{"id":189,"date":"2022-05-10T20:09:46","date_gmt":"2022-05-10T19:09:46","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/?page_id=189"},"modified":"2022-05-10T20:09:46","modified_gmt":"2022-05-10T19:09:46","slug":"security","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<h2 style=\"color: red\">Firewalls<\/h2>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=6UtiQwCX2wU\">Click this link to watch a video on Firewalls<\/a><\/p>\n<p><span data-contrast=\"none\">Data is usually split into &#8216;packets&#8217; before it is sent across a network.<\/span> \u00a0<span data-contrast=\"none\">This means that something like an image file is not sent as one single file. The image data is split into lots of different packets that can be reassembled to create the image file once they are received<\/span><\/p>\n<p><span data-contrast=\"none\">Firewalls are used to check data packets as they are sent to or received from a system or network.<\/span><\/p>\n<ul style=\"font-weight: 400\">\n<li data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">A firewall can be used to:<\/span>\n<ul>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"none\">check that incoming packets meet specific rules before being allowed in<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"none\">set rules about which stations on a network can send or receive packets<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong><span class=\"TextRun SCXO35793482 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXO35793482 BCX8\">Firewalls protect against unauthorised access to a computer system by those who might want to steal data, cause malicious harm or take control of the system.<\/span><\/span><span class=\"EOP SCXO35793482 BCX8\">\u00a0<\/span><\/strong><\/p>\n<h2 style=\"color: red\">Encryption<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-190\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phsn5computingscience\/uploads\/sites\/10033\/2022\/05\/10200729\/Screenshot-2022-05-10-200713-300x181.png\" alt=\"\" width=\"630\" height=\"380\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phsn5computingscience\/uploads\/sites\/10033\/2022\/05\/10200729\/Screenshot-2022-05-10-200713-300x181.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phsn5computingscience\/uploads\/sites\/10033\/2022\/05\/10200729\/Screenshot-2022-05-10-200713-768x463.png 768w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phsn5computingscience\/uploads\/sites\/10033\/2022\/05\/10200729\/Screenshot-2022-05-10-200713-624x376.png 624w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phsn5computingscience\/uploads\/sites\/10033\/2022\/05\/10200729\/Screenshot-2022-05-10-200713.png 926w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/p>\n<p><span data-contrast=\"none\">Encryption is a security measure used to try to prevent unauthorised access to data during transmission from one system or network to another<\/span><\/p>\n<p><span data-contrast=\"none\">Encryption is designed to scramble data so that if an unauthorised person or organisation manage to steal data packets, they will be unable to understand the content<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Keys<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><\/h3>\n<ul style=\"font-weight: 400\">\n<li data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">A public key is used to encrypt the data, thus when it is transmitted over the internet it is secure.<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">A private key is used to decrypt the data<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=ZghMPWGXexs\">Click this link to watch a video on Encryption<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewalls Click this link to watch a video on Firewalls Data is usually split into &#8216;packets&#8217; before it is sent across a network. \u00a0This means that something like an image file is not sent as one single file. The image data is split into lots of different packets that can be reassembled to create the [&hellip;]<\/p>\n","protected":false},"author":79984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-189","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/pages\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/users\/79984"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":1,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/pages\/189\/revisions"}],"predecessor-version":[{"id":191,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/pages\/189\/revisions\/191"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phsn5computingscience\/wp-json\/wp\/v2\/media?parent=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}